github.com/ethereum/go-ethereum@v1.16.1/crypto/secp256k1/libsecp256k1/examples/schnorr.c (about) 1 /************************************************************************* 2 * Written in 2020-2022 by Elichai Turkel * 3 * To the extent possible under law, the author(s) have dedicated all * 4 * copyright and related and neighboring rights to the software in this * 5 * file to the public domain worldwide. This software is distributed * 6 * without any warranty. For the CC0 Public Domain Dedication, see * 7 * EXAMPLES_COPYING or https://creativecommons.org/publicdomain/zero/1.0 * 8 *************************************************************************/ 9 10 #include <stdio.h> 11 #include <stdlib.h> 12 #include <assert.h> 13 #include <string.h> 14 15 #include <secp256k1.h> 16 #include <secp256k1_extrakeys.h> 17 #include <secp256k1_schnorrsig.h> 18 19 #include "examples_util.h" 20 21 int main(void) { 22 unsigned char msg[] = {'H', 'e', 'l', 'l', 'o', ' ', 'W', 'o', 'r', 'l', 'd', '!'}; 23 unsigned char msg_hash[32]; 24 unsigned char tag[] = {'m', 'y', '_', 'f', 'a', 'n', 'c', 'y', '_', 'p', 'r', 'o', 't', 'o', 'c', 'o', 'l'}; 25 unsigned char seckey[32]; 26 unsigned char randomize[32]; 27 unsigned char auxiliary_rand[32]; 28 unsigned char serialized_pubkey[32]; 29 unsigned char signature[64]; 30 int is_signature_valid, is_signature_valid2; 31 int return_val; 32 secp256k1_xonly_pubkey pubkey; 33 secp256k1_keypair keypair; 34 /* Before we can call actual API functions, we need to create a "context". */ 35 secp256k1_context* ctx = secp256k1_context_create(SECP256K1_CONTEXT_NONE); 36 if (!fill_random(randomize, sizeof(randomize))) { 37 printf("Failed to generate randomness\n"); 38 return EXIT_FAILURE; 39 } 40 /* Randomizing the context is recommended to protect against side-channel 41 * leakage See `secp256k1_context_randomize` in secp256k1.h for more 42 * information about it. This should never fail. */ 43 return_val = secp256k1_context_randomize(ctx, randomize); 44 assert(return_val); 45 46 /*** Key Generation ***/ 47 if (!fill_random(seckey, sizeof(seckey))) { 48 printf("Failed to generate randomness\n"); 49 return EXIT_FAILURE; 50 } 51 /* Try to create a keypair with a valid context. This only fails if the 52 * secret key is zero or out of range (greater than secp256k1's order). Note 53 * that the probability of this occurring is negligible with a properly 54 * functioning random number generator. */ 55 if (!secp256k1_keypair_create(ctx, &keypair, seckey)) { 56 printf("Generated secret key is invalid. This indicates an issue with the random number generator.\n"); 57 return EXIT_FAILURE; 58 } 59 60 /* Extract the X-only public key from the keypair. We pass NULL for 61 * `pk_parity` as the parity isn't needed for signing or verification. 62 * `secp256k1_keypair_xonly_pub` supports returning the parity for 63 * other use cases such as tests or verifying Taproot tweaks. 64 * This should never fail with a valid context and public key. */ 65 return_val = secp256k1_keypair_xonly_pub(ctx, &pubkey, NULL, &keypair); 66 assert(return_val); 67 68 /* Serialize the public key. Should always return 1 for a valid public key. */ 69 return_val = secp256k1_xonly_pubkey_serialize(ctx, serialized_pubkey, &pubkey); 70 assert(return_val); 71 72 /*** Signing ***/ 73 74 /* Instead of signing (possibly very long) messages directly, we sign a 75 * 32-byte hash of the message in this example. 76 * 77 * We use secp256k1_tagged_sha256 to create this hash. This function expects 78 * a context-specific "tag", which restricts the context in which the signed 79 * messages should be considered valid. For example, if protocol A mandates 80 * to use the tag "my_fancy_protocol" and protocol B mandates to use the tag 81 * "my_boring_protocol", then signed messages from protocol A will never be 82 * valid in protocol B (and vice versa), even if keys are reused across 83 * protocols. This implements "domain separation", which is considered good 84 * practice. It avoids attacks in which users are tricked into signing a 85 * message that has intended consequences in the intended context (e.g., 86 * protocol A) but would have unintended consequences if it were valid in 87 * some other context (e.g., protocol B). */ 88 return_val = secp256k1_tagged_sha256(ctx, msg_hash, tag, sizeof(tag), msg, sizeof(msg)); 89 assert(return_val); 90 91 /* Generate 32 bytes of randomness to use with BIP-340 schnorr signing. */ 92 if (!fill_random(auxiliary_rand, sizeof(auxiliary_rand))) { 93 printf("Failed to generate randomness\n"); 94 return EXIT_FAILURE; 95 } 96 97 /* Generate a Schnorr signature. 98 * 99 * We use the secp256k1_schnorrsig_sign32 function that provides a simple 100 * interface for signing 32-byte messages (which in our case is a hash of 101 * the actual message). BIP-340 recommends passing 32 bytes of randomness 102 * to the signing function to improve security against side-channel attacks. 103 * Signing with a valid context, a 32-byte message, a verified keypair, and 104 * any 32 bytes of auxiliary random data should never fail. */ 105 return_val = secp256k1_schnorrsig_sign32(ctx, signature, msg_hash, &keypair, auxiliary_rand); 106 assert(return_val); 107 108 /*** Verification ***/ 109 110 /* Deserialize the public key. This will return 0 if the public key can't 111 * be parsed correctly */ 112 if (!secp256k1_xonly_pubkey_parse(ctx, &pubkey, serialized_pubkey)) { 113 printf("Failed parsing the public key\n"); 114 return EXIT_FAILURE; 115 } 116 117 /* Compute the tagged hash on the received messages using the same tag as the signer. */ 118 return_val = secp256k1_tagged_sha256(ctx, msg_hash, tag, sizeof(tag), msg, sizeof(msg)); 119 assert(return_val); 120 121 /* Verify a signature. This will return 1 if it's valid and 0 if it's not. */ 122 is_signature_valid = secp256k1_schnorrsig_verify(ctx, signature, msg_hash, 32, &pubkey); 123 124 125 printf("Is the signature valid? %s\n", is_signature_valid ? "true" : "false"); 126 printf("Secret Key: "); 127 print_hex(seckey, sizeof(seckey)); 128 printf("Public Key: "); 129 print_hex(serialized_pubkey, sizeof(serialized_pubkey)); 130 printf("Signature: "); 131 print_hex(signature, sizeof(signature)); 132 133 /* This will clear everything from the context and free the memory */ 134 secp256k1_context_destroy(ctx); 135 136 /* Bonus example: if all we need is signature verification (and no key 137 generation or signing), we don't need to use a context created via 138 secp256k1_context_create(). We can simply use the static (i.e., global) 139 context secp256k1_context_static. See its description in 140 include/secp256k1.h for details. */ 141 is_signature_valid2 = secp256k1_schnorrsig_verify(secp256k1_context_static, 142 signature, msg_hash, 32, &pubkey); 143 assert(is_signature_valid2 == is_signature_valid); 144 145 /* It's best practice to try to clear secrets from memory after using them. 146 * This is done because some bugs can allow an attacker to leak memory, for 147 * example through "out of bounds" array access (see Heartbleed), or the OS 148 * swapping them to disk. Hence, we overwrite the secret key buffer with zeros. 149 * 150 * Here we are preventing these writes from being optimized out, as any good compiler 151 * will remove any writes that aren't used. */ 152 secure_erase(seckey, sizeof(seckey)); 153 return EXIT_SUCCESS; 154 }